Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 E5 subscription that is associated to a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You use Active Directory Federation Services (AD FS) to federate on-premises Active Directory and the tenant. Azure AD Connect has the following settings:
✑ Source Anchor: objectGUID
✑ Password Hash Synchronization: Disabled
✑ Password writeback: Disabled
✑ Directory extension attribute sync: Disabled
✑ Azure AD app and attribute filtering: Disabled
✑ Exchange hybrid deployment: Disabled
✑ User writeback: Disabled
You need to ensure that you can use leaked credentials detection in Azure AD Identity Protection.
Solution: You modify the Source Anchor settings.
Does that meet the goal?
O365_dude
Highly Voted 5 years, 3 months agojaber1986
3 years, 8 months agoCWT
Highly Voted 5 years, 5 months agoNarenKA
Most Recent 2 years, 8 months agoEltooth
2 years, 9 months agoarska
3 years, 1 month agomkoprivnj
3 years, 5 months agolime568
3 years, 9 months agokiketxu
4 years, 2 months agokiketxu
4 years, 1 month agodoublekill
4 years, 2 months agoJoshycannon
3 years, 5 months agoshanti0091
4 years, 3 months agorkapoor8855
4 years, 3 months agosvm_Terran
4 years, 4 months agoSMHH
4 years, 10 months agom2L
5 years, 3 months ago